Is Mobile Payment Security Cutting Risks and Improving Consumer Expectation?

by July 22, 2016 0 comments

According to new research from global IT association ISACA, advancements in mobile payment security technology are actually curbing risks and improving consumer trust beyond levels traditionally associated with plastic payment cards.

A complimentary guide released, “Is Mobile the Winner in Payment Security?” The question outlines several advantages of mobile payments relative to physical and e-commerce transactions. Tokenization, device-specific cryptograms and two-factor authentication are described as key improvements positioning mobile payments appeal to both consumers and vendors.

“Mobile payments, with embedded, improved and transparent security controls, are a great example of how security can act as a business enabler, contributing to the creation of end-user trust,” said Christos Dimitriadis, Ph.D., CISA, CISM, CRISC, who is ISACA Board chair and group director of information security for INTRALOT.

Some of the mechanisms empowering advancements in mobile payment technology include:

  • Tokenization- Secure mobile payment applications—or mobile wallets—do not transmit card’s Primary Account Number (PAN), instead sending a randomly generated token to the point of sale (POS) terminal and payment network. This token safeguards the consumer’s data while in transit.“Tokenization is the security solution that is pushing mobile payments ahead of card payments in consumer sensitive financial information protection in the continuous race to stay ahead of hackers and other threats,” according to the ISACA guide.The tokens can be configured to only work for transactions that match specific criteria for an exact period of time, specific retailer and certain monetary amount.Only the issuing bank and authorized entities can securely map tokens back to the original payment card data.
  • Device-specific cryptograms – The cryptogram ensures that the payment originated from the card-holder’s device. If a hacker obtains mobile payment transaction data, the cryptogram that is sent to the POS terminal with the token is unable to be used on another mobile device. This helps render any stolen data useless.
  • Two-factor authentication- This provides an additional layer to guard against Mobile Payment Fraud by utilizing two independent mechanisms for authentication. Among the common credentials used are something the user knows (such as a password), something physical that the user has (such as a payment card or phone) and a bio-metric such as a fingerprint, voice print or facial recognition.

If a mobile device containing a mobile wallet is lost, the mobile device can be remotely erased. And since the consumer’s payment card information is not on the mobile device, the payment cards do not need to be replaced.

Like consumers, merchants stand to benefit from mobile payments in many instances. “A key benefit for merchants is that enhanced security should lower fraud and thereby lower costs,” according to the guide. The report also notes that integrating mobile payments into a merchant’s business creates opportunities for more robust customer loyalty programs and allows for purchases in circumstances when customers do not have access to their physical payment card.

The security advantages of mobile payments may surprise the public as well as security experts who perceive mobile payments as risky. ISACA’s 2015 Mobile Payment Security Study shows that only 23 percent of IT and cybersecurity professionals said they believe mobile payments keep personal information safe. Still, the global number of mobile payment users is expected to reach 1.09 billion by 2019, according to Ovum, up from 44.55 million in 2014.

While modern mobile payment methods offer many benefits, the guide also notes some potential vulnerability, including during the one-time enrollment when users register a payment card in the mobile wallet application. Mobile wallet providers use methods such as sending payment card data and a device’s geographical coordinates to issuing banks, and any discrepancies can result in a call seeking additional verification.

The guide encourages vendors that adopt mobile payment options, to regularly re-evaluate risk control measures, which in turn ensures that any new scenarios that could potentially emerge are sufficiently addressed.

 

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.